This book is a collection of short interviews with 14 prominent individuals from different parts of the world, from Australia to Canada, and of different occupations, from low-level programmers to physicists and musicians, asking them a more-or-less similar set of questions on the following topics: their general attitude to programming, attitude towards and experience with Lisp, stories of real-world Lisp projects.
Overall, this should give an insight into why people use Lisp, as well as help the readers gain some new experience and improve as programmers.
This open book is licensed under a Creative Commons License (CC BY-NC-SA). You can download Lisp Hackers ebook for free in PDF format (1.5 MB).
Table of Contents
A Short Intro
A Few Quotes
Zach Beane (USA)
Edi Weitz (Germany)
Slava Akhmechet (USA)
Pascal Costanza (Germany - Belgium)
Peter Seibel (USA)
Marijn Haverbeke (Netherlands - Germany)
François-René (Faré) Rideau (France - USA)
Daniel Barlow (UK)
Christophe Rhodes (UK)
Luke Gorrie (Australia - Sweeden - Switzerland)
Juan José García Ripoll (Spain)
John Fremlin (USA)
Vladimir Sedach (Russia - Canada - USA)
Marc Battyani (France - USA)
The book is a set of tutorials and examples. It uses the Common Lisp language and some of the libraries we'll be using for the examples and tutorials include:
- The hunchentoot web server
- The Restas web framework
- The SEXML library for outputting XML and HTML
- Closure-template for HTML templating
- Postmodern for PostgreSQL access, an...
An experienced programmer accumulates a set of tools, tricks, and techniques to make his or her programs better. C++ Hacker's Guide collects more than 120 of the best C++ veteran secrets and puts them in one accessible place. The techniques presented have all been used in actual programs, and more importantly, have made actual programs better....
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
PicoLisp Works is a compilation of (almost) all available information about the technological gem PicoLisp - a programming language and environment that definitely deserves wider attention.
Built on the unique characteristics of Lisp (almost no syntax, code is equivalent to data), PicoLisp combines powerful abstractions with simplicity and purit...
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.
Andrew Hoffman, a senior security engineer at Salesforce, intro...